Weitere Kapitel dieses Buchs durch Wischen aufrufen
In the wake of surveillance scandals in recent years, as well of the continuous deployment of more sophisticated censorship mechanisms, concerns over anonymity and privacy on the Internet are ever growing. In the last decades, researchers have designed and proposed several algorithms and solutions that allow interested parties to maintain anonymity online, even against powerful opponents. In this chapter, we present a survey of the classical anonymity schemes that proved to be most successful, describing how they work and their main shortcomings. Finally, we discuss new directions in Anonymous Communication Networks (ACN) taking advantage of today’s services, like On-Line Social Networks (OSN). OSN offer a vast pool of participants, allowing to effectively disguise traffic in the high volume of daily communications, thus offering high levels of anonymity and good resistance to analysis techniques.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
2010 free software awards. http://www.fsf.org/news/2010-free-software-awards-announced.
Growing the network, spreading the word. https://download.i2p2.de/media/i2pcon/2015/slides/I2PCon-2015-zzz-GrowingTheNetwork.pdf.
I2p documentation. https://geti2p.net/en/docs/how/tech-intro.
I2p threat model. https://geti2p.net/en/docs/how/threat-model.
The invisible internet project (i2p). https://geti2p.net/en/.
Official Tor FAQ. http://www.torproject.org/docs/faq.html.en.
Xmpp standard. https://xmpp.org/xmpp-software/servers/.
C.A. Ardagna, M. Conti, M. Leone, and J. Stefa. An anonymous end-to-end communication protocol for mobile cloud environments. Services Computing, IEEE Transactions on, 7(3): 373–386, 2014. CrossRef
Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, and Angelos Stavrou. Providing users’ anonymity in mobile hybrid networks. ACM Trans. Internet Technol., 12(3):7:1–7:33, 2013.
Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, and Christopher Kruegel. Abusing social networks for automated user profiling. In Recent Advances in Intrusion Detection, volume 6307 of Lecture Notes in Computer Science, pages 422–441. 2010.
F. Beato, M. Conti, and B. Preneel. Friend in the Middle (FiM): tackling de-anonymization in social networks. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 279–284, 2013.
F. Beato, M. Conti, B. Preneel, and D. Vettore. Virtualfriendship: Hiding interactions on online social networks. In Communications and Network Security (CNS), 2014 IEEE Conference on, pages 328–336, 2014.
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW ’09, pages 551–560, 2009.
Joseph Bonneau, Jonathan Anderson, Ross Anderson, and Frank Stajano. Eight friends are enough: Social graph approximation via public listings. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS ’09, pages 13–18, New York, NY, USA, 2009. ACM.
Andrea Burattin, Giuseppe Cascavilla, and Mauro Conti. Socialspy: Browsing (supposedly) hidden information in online social networks. In Risks and Security of Internet and Systems, Lecture Notes in Computer Science, pages 83–99. 2015.
Jernigan. C. and B. F. T. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday Journal, 2009.
G. Cascavilla, M. Conti,, D. Schwartz, and I. Yahav. Revealing censored information through comments and commenters in online social networks. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, 2015.
David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84–90, 1981. CrossRef
Ian Clarke, Scott G. Miller, Theodore W. Hong, Oskar Sandberg, and Brandon Wiley. Protecting free expression online with Freenet. In IEEE Internet Computing, volume 6, pages 40–49, 2002.
Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pages 46–66, 2001.
Bernd Conrad and Fatemeh Shirazi. A survey on Tor and I2P. In Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP 2014), 2014.
M. Conti, R. Poovendran, and M. Secchiero. Fakebook: Detecting fake profiles in on-line social networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on, pages 1071–1078, 2012.
Mauro Conti, Arbnor Hasani, and Bruno Crispo. Virtual private social networks. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY ’11, pages 39–50, 2011.
Mauro Conti, Arbnor Hasani, and Bruno Crispo. Virtual private social networks and a facebook implementation. ACM Trans. Web, 7(3):14:1–14:31, 2013.
George Danezis. The traffic analysis of continuous-time mixes. In Privacy Enhancing Technologies, Lecture Notes in Computer Science, pages 35–50. 2005.
George Danezis, Claudia Diaz, Carmela Troncoso, and Ben Laurie. Drac: An architecture for anonymous low-volume communications. In Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS’10, pages 202–219, 2010.
Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM’04, pages 21–21, 2004.
John R. Douceur. The sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS ’01, pages 251–260, 2002.
Christoph Egger, Johannes Schlumberger, Christopher Kruegel, and Giovanni Vigna. Practical attacks against the i2p network. In Research in Attacks, Intrusions, and Defenses, Lecture Notes in Computer Science, pages 432–451. 2013.
Nathan S. Evans, Roger Dingledine, and Christian Grothoff. A practical congestion attack on Tor using long paths. In Proceedings of the 18th Conference on USENIX Security Symposium, SSYM’09, pages 33–50, 2009.
Michael Herrmann and Christian Grothoff. Privacy-implications of performance-based peer selection by onion-routers: A real-world case study using i2p. In Privacy Enhancing Technologies, pages 155–174. Springer Berlin Heidelberg, 2011.
Lei Jin, Hassan Takabi, and James B.D. Joshi. Towards active detection of identity clone attacks on online social networks. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY ’11, pages 27–38, 2011.
Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users get routed: traffic correlation on Tor by realistic adversaries. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS ’13, pages 337–348, 2013.
Dogan Kedogan, Dakshi Agrawal, and Stefan Penz. Limits of anonymity in open environments. In Revised Papers from the 5th International Workshop on Information Hiding, IH ’02, pages 53–69, 2003.
G. Kontaxis, I. Polakis, S. Ioannidis, and E.P. Markatos. Detecting social network profile cloning. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, pages 295–300, 2011.
BrianN. Levine, MichaelK. Reiter, Chenxi Wang, and Matthew Wright. Timing attacks in low-latency mix systems. In Financial Cryptography, Lecture Notes in Computer Science, pages 251–265. 2004.
P. Mittal, M. Wright, and N. Borisov. Pisces: Anonymous communication using social networks. NDSS, 2013.
A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Security and Privacy, 2009 30th IEEE Symposium on, pages 173–187, 2009.
Mike Perry. Securing the Tor network. http://www.blackhat.com/presentations/bh-usa-07/Perry/Presentation/bh-usa-07-perry.pdf.
Christopher Riederer, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, and Pablo Rodriguez. For sale: Your data: By: You. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets-X, pages 13:1–13:6, 2011.
Stefanie Roos, Benjamin Schiller, Stefan Hacker, and Thorsten Strufe. Measuring freenet in the wild: Censorship-resilience under observation. In Privacy Enhancing Technologies, Lecture Notes in Computer Science, pages 263–282. 2014.
Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor. Monitoring the i2p network. http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf,2011.
Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P.N. Puttaswamy, and Ben Y. Zhao. User interactions in social networks and their implications. In Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys ’09, pages 205–218, 2009.
Bassam Zantout and Ramzi Haraty. I2p data communication system. In Proceedings of The Tenth International Conference on Networks, ICN 2011.
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of the 4th International Conference on Privacy Enhancing Technologies, PET’04, pages 207–225, 2005.
- Anonymity in an Electronic Society: A Survey
Fabio De Gaspari
Luigi Vincenzo Mancini
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com